All Auth0 Blog
- Ktor
Adding Auth0 Authorization to a Ktor HTTP API
- IAM
State Identity Solutions: Build? Buy? Or Both?
- Cybersecurity
The Hacker Mindset
- Ktor
Creating an HTTP API with Ktor and Kotlin
- Python
How to Make a Twitter Bot in Python using Tweepy
A reply-to-mention Twitter bot that can reply to every tweet where it got mentioned with a specific keyword with an auto-generated image.
- Data Breach
The Worst Data Breaches of 2021 (Q1 and Q2)
The causes of major data breaches are shifting. Here’s how to protect your organization.
- 2FA
The Working Principles of 2FA (2-Factor Authentication) Hardware
Why hardware-based Two-Factor Authentication makes the user much more secure over other multi-factor alternatives
- Zappa
Deploying Django RESTful APIs as Serverless Applications with Zappa
Learn how to develop a serverless Django API, deploy it to AWS using Zappa, and secure it with Auth0.
- .NET
Permission-Based Security for ASP.NET Web APIs
Checking user permissions allows you to have more control over access to your ASP.NET Web API.
- Attack Prevention
What Is Password Spraying? How to Stop Password Spraying Attacks
Password spraying attacks can cause major data breaches. Here’s how to prevent them from doing so.
- Digital Currency
101 Smart Contracts and Decentralized Apps in Ethereum
Smart contracts are a new way to build decentralized applications in a Blockchain.
- API
What Is an API? How APIs Work (for Non-Developers)
- 2FA
The Working Principles of 2FA (2-Factor Authentication) Software